About

Share on:

Aaron Pohl has had hands on keyboards since the time he needed to stand on a desk chair to reach the keys. When Aaron got into High School, he started classes in computer repair and quickly started becoming interested in linux and networking through ArborNet/M-Net, where he got his first-taste of Unix, and quickly started playing with open-source operating systems and learning about security basics at home. In college, Aaron continued to focus on computer networking and security, and achieved an Associate's of Applied Science in Computer System Security from a local community college.

Post-college, Aaron has performed in technical support roles at both Barracuda Networks as well as Duo Security, where he gained a solid understanding of the design of an average corporate network, from small to large, through supporting customers of various sizes in implementing both various security appliances as well as multi-factor authentication within their networks. From here, Aaron got into Penetration Testing, first for three years at NetWorks Group, and then at CBI, where Aaron currently works as a Senior Penetration Tester.

Aaron has performed penetration tests for companys of all sizes -- from small 5-person teams to 19,000+ employee groups to Fortune 100 companies with brands that span continents, and from Accounting to Zoography and every point in-between, Aaron has worked with companies in practically every vertical. Whether you need an external, internal, or wireless network assessment, a physical security assessment, a web application penetration test, or purple team engagement, Aaron has experience in it all, and has years of expertise to bring to the table.

Aaron has a solid background in python scripting as well as in network/system/cloud orchestration/automation utilizing ansible, and has also written small tools and scipts in many other languages throughout the course of his work, to the point where the languages have stopped being as important as finding a level of understanding how to accomplish a given task in whatever language the current project requires.

Aaron has also spoken at A2Y.ASM on automating red team infrastructure with Ansible, and is a member of both ArbSec and MiSec, and in the past has participated with and competed on multiple CTF teams.